Skip to main content
FORTISEU
Back to Blog
GDPR14 January 20268 min readAttila Bognar

GDPR at Eight: What €4.5 Billion in Fines Has Actually Changed

Eight years of GDPR enforcement have shifted the regulatory focus from privacy policies to technical controls. Analysis of cumulative fines, DPA activity, and what the enforcement trajectory means for 2026-2027.

GDPR at Eight: What €4.5 Billion in Fines Has Actually Changed featured visual
GDPRenforcementfinesDPA trends

Eight years after the General Data Protection Regulation became enforceable on 25 May 2018, the cumulative fine total has crossed €4.5 billion. That number, while headline-worthy, obscures a more consequential shift: European data protection authorities have moved from policing paperwork to auditing technical architecture. The era of enforcement-by-privacy-policy is over. What matters now is whether your controls actually function under pressure.

This is not a retrospective for nostalgia. It is an analysis of where enforcement has landed, what patterns have emerged, and what those patterns predict for the next two years — particularly as NIS2 enforcement begins converging with GDPR investigations.

The Enforcement Numbers: €4.5 Billion and Counting

By January 2026, GDPR fines imposed across the European Economic Area have surpassed €4.5 billion in aggregate. The distribution is instructive.

The top ten fines by value account for roughly 60% of the total. Meta alone has absorbed over €2.5 billion across its various entities (Facebook, Instagram, WhatsApp), primarily through the Irish Data Protection Commission — though increasingly through joint decisions under Article 65. Amazon's €746 million Luxembourg fine (2021) remains the single largest penalty issued to a non-Meta entity. TikTok, Google, and Criteo round out the upper tier.

Sector concentration tells a clearer story than individual fines. Technology platforms dominate the headline penalties, but the volume of enforcement actions — measured by count rather than value — lands disproportionately on telecommunications, financial services, and healthcare. These sectors process personal data at scale, under tight regulatory oversight from multiple angles, and their technical infrastructure is complex enough that supervisory authorities can find genuine control failures rather than just missing cookie banners.

Public sector entities have not been spared. Multiple Member States have fined municipalities, hospitals, and government agencies. The Swedish DPA (IMY) fined the national police authority. The Finnish DPA sanctioned a municipality for unlawful profiling of social welfare recipients. These cases matter because they demonstrate that enforcement extends beyond the private sector targets that generate press coverage.

Which DPAs Matter Most in 2026

The distribution of enforcement activity across Europe has changed materially since 2018. Three shifts define the current landscape.

Ireland's DPC has cleared its backlog. The Irish Data Protection Commission spent years under criticism for slow case resolution, particularly on cross-border complaints involving Silicon Valley companies headquartered in Dublin. The combination of increased staffing (the DPC's budget doubled between 2020 and 2024), procedural reforms, and pressure from the European Data Protection Board's Article 65 dispute resolution mechanism has produced results. The DPC now resolves cross-border cases within timelines that other authorities consider reasonable. More importantly, its decisions on technical security measures — such as the €1.2 billion Meta transfer decision — have established precedents that other DPAs reference in their own enforcement.

CNIL leads technical enforcement. France's Commission Nationale de l'Informatique et des Libertés has consistently pursued enforcement actions grounded in technical control failures rather than procedural documentation gaps. CNIL's investigation methodology involves on-site technical audits, source code review in certain cases, and detailed analysis of data flows. Its 2024-2025 enforcement wave focused heavily on Article 25 (data protection by design) and Article 32 (security of processing), with fines imposed for inadequate encryption, excessive data retention in production databases, and failure to implement access controls commensurate with data sensitivity. For any organisation processing significant volumes of personal data in France, CNIL's technical posture is the benchmark.

Smaller DPAs are punching above their weight. The Italian Garante, Spain's AEPD, and Sweden's IMY have each developed specialised enforcement programmes. AEPD processes the highest volume of complaints in Europe and has become particularly effective at video surveillance and employment monitoring enforcement. IMY has focused on biometric data and facial recognition. The Garante has pursued aggressive enforcement against AI-driven data processing, including the temporary ChatGPT ban that forced a global conversation about generative AI and personal data.

The practical implication: multinational organisations can no longer assume that "we're headquartered in Ireland, so the DPC is our only concern." Joint investigations, Article 60 cooperation, and Article 65 dispute resolution mean that technical standards from CNIL, operational expectations from AEPD, and sector-specific requirements from national authorities all apply simultaneously.

The Shift: From Documentation to Technical Measures

The most important enforcement trend of the past three years is the pivot from documentation-centric to technically-grounded investigations.

In the early years (2018-2021), the majority of significant fines related to transparency failures (inadequate privacy notices), consent mechanisms (pre-ticked boxes, dark patterns), and legal basis disputes (legitimate interest vs. consent for advertising). These are real violations, but they are fundamentally legal and procedural in nature. A competent lawyer could assess and remediate them without touching a line of code.

From 2022 onward, the centre of gravity shifted. Article 32 — security of processing — has become the most consequential enforcement provision after Article 5 (principles) and Article 6 (lawfulness). Supervisory authorities are now fining organisations for:

  • Inadequate encryption at rest and in transit, particularly where personal data categories under Article 9 (health, biometric, genetic) are involved
  • Excessive access privileges where production databases are accessible to personnel without a demonstrable need-to-know
  • Insufficient logging and monitoring that prevents the controller from detecting or investigating a breach within the 72-hour notification window under Article 33
  • Data retention failures where personal data persists in backup systems, analytics pipelines, or development environments long after the stated retention period
  • Vendor security failures under Article 28, where controllers failed to verify that processors implemented adequate technical measures

This shift has consequences for how organisations structure their GDPR compliance programmes. A privacy team that operates independently from engineering and security cannot deliver the technical evidence that supervisory authorities now expect. The DPO who has never reviewed an access control matrix or a data flow diagram is operating with an incomplete picture.

Cross-Border Enforcement Finally Working

Article 65 of the GDPR provides a dispute resolution mechanism for cases where lead supervisory authorities and concerned supervisory authorities disagree on enforcement. For years, this mechanism was criticised as slow and procedurally cumbersome. That criticism was fair through 2023.

By 2025, the European Data Protection Board had refined its Article 65 procedures to the point where binding decisions are issued within months rather than years. The EDPB's decisions have consistently pushed toward higher fines and stricter interpretations than the lead authority initially proposed. This has created a ratchet effect: DPAs that might have imposed moderate penalties know that other authorities can escalate through the EDPB.

The Schrems II aftermath also deserves attention. The 2020 CJEU decision invalidating the EU-US Privacy Shield created years of legal uncertainty around transatlantic data transfers. The EU-US Data Privacy Framework, adopted in July 2023, resolved the immediate crisis — but enforcement of transfer mechanisms under Articles 44-49 remains active. Supervisory authorities continue to investigate organisations relying on Standard Contractual Clauses without conducting adequate Transfer Impact Assessments. The lesson: having a transfer mechanism in place is necessary but insufficient. Authorities want evidence that you assessed the risk and implemented supplementary technical measures where the legal assessment warranted them.

For organisations managing breach notification obligations, the cross-border dimension adds complexity. A breach affecting data subjects in multiple Member States triggers notification obligations to multiple supervisory authorities unless a lead authority is clearly established. Organisations without a clear picture of where their data subjects are located — and which authority is competent — will struggle to meet the 72-hour window under Article 33.

What This Means for 2026-2027: NIS2 and GDPR Convergence

The most significant development on the enforcement horizon is the convergence of GDPR and NIS2 investigations. NIS2, which became applicable in October 2024 (with Member State transposition ongoing), imposes cybersecurity obligations on essential and important entities that substantially overlap with GDPR Article 32.

When a personal data breach also constitutes a significant incident under NIS2 Article 23, the affected organisation faces parallel investigations from both the data protection authority and the NIS2 competent authority. These investigations will examine overlapping technical controls — access management, encryption, logging, incident response — through different legal lenses but with similar evidentiary expectations.

Joint investigations are not theoretical. Several Member States have already established cooperation agreements between their DPA and their NIS2 competent authority (often the national cybersecurity centre). France, where CNIL and ANSSI already have a history of cooperation, is the most advanced. Germany, where the BSI serves as the NIS2 competent authority for federal entities, is developing similar protocols.

For DPOs and CISOs, this convergence means that compliance evidence must be structured to serve multiple regulatory audiences simultaneously. A single control framework that maps to both GDPR Article 32 and NIS2 Article 21 is not a nice-to-have — it is an operational necessity.

The EDPB's 2025 guidance on the interplay between GDPR and NIS2 explicitly acknowledged this convergence, noting that "security measures required under the GDPR and NIS2 Directive should be implemented in a coherent manner" and that supervisory authorities should "avoid duplicative or contradictory requirements." That guidance is aspirational. In practice, harmonisation depends on national implementation, and organisations should prepare for the possibility that two regulators will ask for the same evidence in different formats.

Key Takeaways

  • Technical controls are now the primary enforcement target. Eight years of GDPR enforcement have shifted the focus from privacy policies and consent banners to encryption, access controls, logging, and data retention implementation. Organisations that invest in documentation without corresponding technical controls are exposed.
  • Multi-DPA enforcement is the new normal. Cross-border cooperation mechanisms under Articles 60 and 65 function effectively. No organisation should assume that managing a single lead authority is sufficient.
  • NIS2 convergence creates dual exposure. Personal data breaches that also qualify as NIS2 significant incidents will trigger parallel investigations. A unified control framework mapping to both GDPR Article 32 and NIS2 Article 21 is operationally necessary.
  • Enforcement volume is increasing, not plateauing. DPA budgets and staffing have grown across the EEA. The EDPB's coordination infrastructure is mature. Expect more enforcement actions, at higher values, with greater technical depth.
Next Step

Turn guidance into evidence.

If procurement is involved, start with the Trust Center. If you want to see the product, create an account or launch a live demo.